Campanelli, M., Francati, D. & Orlandi, C. (2023).
Structure-Preserving Compilers from New Notions of Obfuscations. In A. Boldyreva & V. Kolesnikov (Eds.),
Public-Key Cryptography – PKC 2023: 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part II (pp. 663-693). Springer.
https://doi.org/10.1007/978-3-031-31371-4_23
Damgård, I., Haagh, H., Mercer, R.
, Nitulescu, A., Orlandi, C. & Yakoubov, S. (2020).
Stronger Security and Constructions of Multi-designated Verifier Signatures. In R. Pass & K. Pietrzak (Eds.),
Theory of Cryptography - 18th International Conference, TCC 2020, Proceedings: Proceedings (Vol. II, pp. 229-260). Springer.
https://doi.org/10.1007/978-3-030-64378-2_9
Aggarwal, D.
, Damgård, I., Nielsen, J. B., Obremski, M., Purwanto, E., Ribeiro, J.
& Simkin, M. (2019).
Stronger leakage-resilient and non-malleable secret sharing schemes for general access structures. In A. Boldyreva & D. Micciancio (Eds.),
Advances in Cryptology – CRYPTO 2019 : 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings (Vol. II, pp. 510-539). Springer.
https://doi.org/10.1007/978-3-030-26951-7_18
Orlandi, C., Ostrovsky, R., Rao, V., Sahai, A. & Visconti, I. (2014).
Statistical Concurrent Non-malleable Zero Knowledge. In Y. Lindell (Ed.),
Theory of Cryptography: 11th Theory of Cryptography Conference, TCC 2014, 2014. Proceedings (pp. 167-191). Springer Publishing Company.
https://doi.org/10.1007/978-3-642-54242-8_8
Woodcock, J., Andersen, M. S., Aranha, D. F., Hallerstede, S., Hansen, S. T., Jakobsen, N. K.
, Kulik, T., Larsen, P. G., Macedo, H. D., Martin, C. I. I. & Norrild, V. A. M. (2023).
State of the Art Report: Verified Computation.
https://doi.org/10.48550/arXiv.2308.15191
Goel, A.
, Hall-Andersen, M. N., Kaptchuk, G. & Spooner, N. (2023).
Speed-Stacking: Fast Sublinear Zero-Knowledge Proofs for Disjunctions. In C. Hazay & M. Stam (Eds.),
Advances in Cryptology – EUROCRYPT 2023: 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23–27, 2023, Proceedings, Part II (pp. 347-378). Springer.
https://doi.org/10.1007/978-3-031-30617-4_12
Taverne, J., Faz-Hernandez, A.
, Aranha, D. F., Rodriguez-henriquez, F., Hankerson, D. & Lopez, J. (2011).
Speeding scalar multiplication over binary elliptic curves using the new carry-less multiplication instruction.
Journal of Cryptographic Engineering,
1, 187-199.
https://doi.org/10.1007/s13389-011-0017-8
Cramer, R.
, Damgård, I., Escudero, D., Scholl, P. & Xing, C. (2018).
SPDΖ2k: Efficient MPC mod 2k for Dishonest Majority. In H. Shacham & A. Boldyreva (Eds.),
Advances in Cryptology - CRYPTO 2018 (Vol. 10992, pp. 769-798). Springer VS.
https://doi.org/10.1007/978-3-319-96881-0_26
Baum, C., Dittmer, S.
, Scholl, P. & Wang, X. (2023).
Sok: vector OLE-based zero-knowledge protocols.
Designs, Codes, and Cryptography,
91(11), 3527-3561.
https://doi.org/10.1007/s10623-023-01292-8
Taverne, J., Faz-Hernandez, A.
, Aranha, D. F., Rodriguez-henriquez, F., Hankerson, D. & Lopez, J. (2011).
Software Implementation of Binary Elliptic Curves: Impact of the Carry-Less Multiplier on Scalar Multiplication. In B. Preneel & T. Takagi (Eds.),
Cryptographic Hardware and Embedded Systems – CHES 2011 (pp. 108-123). Springer.
https://doi.org/10.1007/978-3-642-23951-9_8
Aranha, D. F., J. Dominguez Perez, L., Mrabet, A. & Swchabe, P. (2016).
Software Implementation. In N. El Mrabet & M. Joye (Eds.),
Guide to Pairing-Based Cryptography Chapman & Hall/CRC.
Abdolmaleki, B.
, Khoshakhlagh, H. & Lipmaa, H. (2021).
Smooth Zero-Knowledge Hash Functions. In A. Adhikari, R. Küsters & B. Preneel (Eds.),
Progress in Cryptology – INDOCRYPT 2021 - 22nd International Conference on Cryptology in India, 2021, Proceedings: 22nd International Conference on Cryptology in India, Jaipur, India, December 12-15, 2021, Proceedings (pp. 510-535). Springer.
https://doi.org/10.1007/978-3-030-92518-5_23
Tozawa, K.
, Morita, H. & Mizuki, T. (2023).
Single-Shuffle Card-Based Protocol with Eight Cards per Gate. In D. Genova & J. Kari (Eds.),
Unconventional Computation and Natural Computation: 20th International Conference, UCNC 2023, Jacksonville, FL, USA, March 13–17, 2023, Proceedings (pp. 171-185). Springer.
https://doi.org/10.1007/978-3-031-34034-5_12
Faust, S., Hazay, C.
, Nielsen, J. B., Nordholt, P. S. & Zottarel, A. (2016).
Signature Schemes Secure Against Hard-to-Invert Leakage.
Journal of Cryptology,
29(2), 422-455.
https://doi.org/10.1007/s00145-015-9197-1
Faust, S., Hazay, C.
, Nielsen, J. B., Nordholt, P. S. & Zottarel, A. (2012).
Signature Schemes Secure against Hard-to-Invert Leakage.
Lecture Notes in Computer Science,
7658, 98-115.
https://doi.org/10.1007/978-3-642-34961-4_8
Fehér, M., Yazdani, N., Aranha, D. F., Lucani Rötter, D. E., Hansen, M. T. & Vester, F. E. (2020).
Side Channel Security of Smart Meter Data Compression Techniques. In
2020 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2020: Proceedings Article 9302931 IEEE.
https://doi.org/10.1109/SmartGridComm47815.2020.9302931
Aranha, D. F., Berndt, S., Eisenbarth, T., Seker, O.
, Takahashi, A., Wilke, L. & Zaverucha, G. (2021).
Side-Channel Protections for Picnic Signatures. Abstract from Third PQC Standardization Conference, Washington, United States.
Damgård, I. B., Cramer, R. & Ishai, Y. (2005).
Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation. In J. Killian (Ed.),
Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005. Proceedings (pp. 342-362). Springer.
https://doi.org/10.1007/978-3-540-30576-7_19
Dalskov, A. P. K., Orlandi, C., Keller, M., Shrishak, K. & Shulman, H. (2020).
Securing DNSSEC Keys via Threshold ECDSA from Generic MPC. In L. Chen, S. Schneider, N. Li & K. Liang (Eds.),
European Symposium on Research in Computer Security : Computer Security – ESORICS 2020 (Vol. I, pp. 654-673). Springer.
https://doi.org/10.1007/978-3-030-59013-0_32
Oliveira, L. B., Kansal, A., Gouvea, C. P. L.
, Aranha, D. F., Lopez, J., Priyantha, B., Goraczko, M. & Zhao, F. (2011).
Secure-TWS: Authenticating Node to Multi-user Communication in Shared Sensor Networks.
The Computer Journal,
55(4), 384-396.
https://doi.org/10.1093/comjnl/bxr089
Damgård, I. B., Nielsen, J. B., Fitzi, M. & Desmedt, Y. (2007).
Secure Protocols with Asymmetric Trust. In
Advances in Cryptology - ASIACRYPT 2007: 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007. Proceedings (pp. 357-375). Springer.
https://doi.org/10.1007/978-3-540-76900-2_22